|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] xenbus and the message of doom
On Tue, Jan 03, Ian Campbell wrote:
> As I said in the bit you trimmed the precedent seems to be to
> write /local/domain/<N>/control/platform-feature-<X> for each guest that
> you want to expose the feature to. I think a per-guest key makes sense
> since even if something seems obviously global you never know when you
> might need to hide it from a guest (e.g. to workaround an in-guest bug).
>
> I'm afraid I don't have time to work on this myself but it seems pretty
> simple?
After looking at this, the (compile tested) patch below should be enough:
diff -r 3a22ed3ec534 tools/xenstore/xs.c
--- a/tools/xenstore/xs.c
+++ b/tools/xenstore/xs.c
@@ -884,6 +884,10 @@ bool xs_introduce_domain(struct xs_handl
char mfn_str[MAX_STRLEN(mfn)];
char eventchn_str[MAX_STRLEN(eventchn)];
struct iovec iov[3];
+ static const char feat[] = "control/platform-feature-xs_reset_watches";
+ int len;
+ char *dom_path, *feat_path;
+ bool ret;
snprintf(domid_str, sizeof(domid_str), "%u", domid);
snprintf(mfn_str, sizeof(mfn_str), "%lu", mfn);
@@ -896,8 +900,21 @@ bool xs_introduce_domain(struct xs_handl
iov[2].iov_base = eventchn_str;
iov[2].iov_len = strlen(eventchn_str) + 1;
- return xs_bool(xs_talkv(h, XBT_NULL, XS_INTRODUCE, iov,
+ ret = xs_bool(xs_talkv(h, XBT_NULL, XS_INTRODUCE, iov,
ARRAY_SIZE(iov), NULL));
+
+ dom_path = xs_get_domain_path(h, domid);
+ if (dom_path) {
+ len = strlen(dom_path) + 1 + strlen(feat);
+ feat_path = malloc(len + 1);
+ if (feat_path) {
+ snprintf(feat_path, len + 1, "%s/%s", dom_path, feat);
+ xs_write(h, XBT_NULL, feat_path, "1", 1);
+ free(feat_path);
+ }
+ free(dom_path);
+ }
+ return ret;
}
bool xs_set_target(struct xs_handle *h,
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |